CVE-2014-4508

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86platforms, when syscall auditing is enabled and the sep CPU feature flag isset, allows local users to cause a denial of service (OOPS and systemcrash) via an invalid syscall number, as demonstrated by number 1000.

Ubuntu-Description

Toralf Förster reported an error in the Linux kernels syscall auditing on32 bit x86 platforms. A local user could exploit this flaw to cause adenial of service (OOPS and system crash).